Skip to main content

Network Security in IT Fundamentals

 


    Network Security is major part of today’s IT world. Hardware, the computers operating systems, databases and computer applications are just some of the essential components of information technology fundamentals. These components are not impenetrable, that’s where network security comes into play. It is the digital security guard for the computer and all of these components that is preventing unauthorized access to data that’s stored on your computer. Pictures, email addresses, passwords and bank account information are targets that a hacker might want to obtain and having proper network security will aid in the protection of those assets.

 

Information Technology Concepts and Network Security

Network security relates to information technology concepts as IT is all about managing, exchanging, processing and protecting information and network security is ensuring that information remains intact and available to only the authorized users. Network security is under the computer science umbrella; however, computer science is more geared towards computational problems whereas network security is more about the security of the information on the computer. Network security even existed in the early years of computers, but in a different manner. Network security was more about the physical protection of the computers as they were isolated in different rooms, focusing on ensuring that only required personnel had physical access to it.

 

Reliance on Major Hardware

Some major computer components that network security relies on is the RAM, Storage, CPU and cooling fans. Sufficient RAM is necessary for computers to run antivirus software smoothly as the more RAM you have the faster your computer will operate. Storage is important to network security for maintaining the backup files and sensitive information. The CPU is the brain of the computer that runs the program instructions. Network security really can’t exist without the CPU of the computer. Finally, cooling fans are important as they prevent overheating of the CPU and other components and overheating can lead to hardware failure, putting your system at risk. Cooling fans ensure the smooth operation of security systems by keeping that temperature in check and facilitating optimal operation.

 

Network Security and Programing Languages

            Network Security relies on programming languages heavily such as Python and JavaScript. As described in Codecademy, these programming languages allows for automated tasks to detect and analyze potential malware (Carpenter, 2021). They can also be used for penetration testing to help see if any potential vulnerabilities exist. Main execution methods in network security would be in real time and on a scheduled basis. Some programs should be running real time to be able to respond to threats as they happen real time, whereas scans, updates and backups will probably be on that routine scheduled basis. These programming languages is what allows these network security systems to operate when intended.  

 

Application Software in Network Security

            Application software much like programming languages plays a vital role in network security. Security software such as antivirus software like McAfee or Norton and firewalls will be the first line of defense that can detect and prevent potential malware from your network. Other software such as a VPN help create encrypted and secure connections, aiding in the privacy of the user. These application software’s provide a necessary means to monitor and protect networks against potential cyberthreats that occur on a daily basis all over the world. Without these applications running, it leaves your network extremely vulnerable to hackers who want to get that data on that network and leave your network in shambles.

 

Database Management

            A database is where information is stored, managed and where it can be accessed electronically. A couple examples of this would be how most, if not all hospitals store patient data or how Amazon keeps track of their inventory. That all gets inputted into a database of some kind. Database management utilizes management systems such as Oracle Database to be able to add, edit, query and delete information within the database. Network securities role in relation to databases is all about safeguarding the information stored on these databases. This happens by means of access control, vulnerability management, firewall protection and system backups and recovery. 

 

Network Architecture, Management and Security

            Network architecture is composed of the aspects of the network, such as routers, switches, modems and storage of the data to name a few according to eSecurity planet (Kime, 2024). Managing that network is all about maintaining and monitoring that network to ensure it is functioning as intended. Implementing solid network security can ensure that the hardware and software of that network are being protected and can withstand the different kinds of cyber attacks, mitigating security incidents, preventing unauthorized access and simply maintaining the overall integrity of that network.  

 

 

 

 

References:

Carpenter, A. Codecademy. (2021, Jun 15). What Programming Languages Are Used in Cybersecurity?. https://www.codecademy.com/resources/blog/what-programming-languages-are-used-in-cybersecurity/

Crocetti, P. (2025, Jan 15). Tech Accelerator. Data storage management: What is it and why is it important?. https://www.techtarget.com/searchstorage/Data-storage-management-What-is-it-and-why-is-it-important

Kime, C. (2024, Apr 26). eSecurity Planet. Network Security Architecture: Best Practices & Tools https://www.esecurityplanet.com/networks/network-security-architecture/?form=MG0AV3

Lysecky, S, Vahid, F, Wheatland, N. (2019, February). TEC 101: Fundamentals of Information Technology & Literacy.

MOOC.org. (2021, Nov 16). Cybersecurity and Computer Science: What’s the Connection?. https://www.mooc.org/blog/cybersecurity-and-computer-science-whats-the-connection

Comments

Popular posts from this blog

Ping Commands, Viruses, and Phishing

       Ping commands are useful when it comes to troubleshooting and checking to see if a website is available and how fast you would be able to access it. However, ping can also be used for malicious intent. Today I will discuss an attack possible by means of ping commands. I will also get into computer security incidents like computer viruses and phishing and discuss what makes computers vulnerable to them, the damage they can inflict and protection methods for each. Ping Commands for Malicious Intent One major attack that can be accomplished by using ping commands is a denial of service attack. A denial of service attack is when a target website is basically overloaded to the point that it is rendered useless. By using the ping command, an attacker will send oversized data packets to a target website that will be too much for it to handle and causing the site to crash, not allowing legit users to use that site for a certain amount of time. An example of this ...

The Pros and Cons of Microsoft Word, Excel, and PowerPoint

    All throughout the information technology world you will at some point have to utilize applications such as Microsoft Word, Excel and PowerPoint. These are some of the most common and basic applications that are out there today. Today I will be discussing the advantages and disadvantages of each, and how they compare to one another. Microsoft Word Advantages: Versatility in Writing: Word is perfect for all writing purposes, whether you're drafting a book, essay, poetry, contract or work memorandum. Formatting: It offers a lot of formatting tools, including various font styles, sizes, alignments, customizable margins, and borders for a more appealing document. User Friendly: This application is really easy for the user to utilize, navigate and learn quickly. Disadvantages: Limited Data Formatting: Word excels in writing and formatting that text, however, it lacks the data formatting capabilities found in other applic...

Intro to Programming Languages

  Having very little IT experience, this project is my first steps towards a better background in that department. It is exciting and makes me nervous at the same time as I have never used nor even read about programming languages before. This was the same for the program Scratch, but the outcome was positive and gave me a better understanding of what program coding consists of. The following is the link to my Scratch program :  https://scratch.mit.edu/projects/1116622511 This was quite interesting, having never used the program Scratch, I found myself struggling a bit at first trying to figure out how all the different codes would affect the outcome. Once I had a decent grasp of that, I knew what I wanted to do but getting the figures to do it how I wanted was the challenge. The biggest challenge was getting the timing right for everything. I overcame this by simple trial and error. I would set a time for something, run the program and see if it needed to be slowed or sped up...